Bending and Twisting Networks - Paul Coggins Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)
Bending and Twisting Networks
Paul Coggins
Derbycon 2014

Learn about network attack vectors that an adversary can use to control, and influence network traffic flows and exfiltrate data by exploiting network devices and protocols in the LAN, WAN and Cloud. Defensive methods and techniques for monitoring and protecting against the outlined attack vectors will be discussed. This presentation explores advanced methods and techniques that penetration testers, network engineers and security auditors need to understand about network infrastructure and protocols.

Back to Derbycon 2014 video list



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek